CVE-2012-1601: The KVM implementation in the Linux
kernel allowed host OS users to cause a denial of service
(NULL pointer dereference and host OS crash) by making a
KVM_CREATE_IRQCHIP ioctl call after a virtual CPU already
exists.

*

CVE-2012-2137: Buffer overflow in virt/kvm/irq_comm.c
in the KVM subsystem in the Linux kernel allowed local
users to cause a denial of service (crash) and possibly
execute arbitrary code via vectors related to Message
Signaled Interrupts (MSI), irq routing entries, and an
incorrect check by the setup_routing_entry function before
invoking the kvm_set_irq function.

*

CVE-2012-2372: The rds_ib_xmit function in
net/rds/ib_send.c in the Reliable Datagram Sockets (RDS)
protocol implementation in the Linux kernel allowed local
users to cause a denial of service (BUG_ON and kernel
panic) by establishing an RDS connection with the source IP
address equal to the IPoIB interface's own IP address, as
demonstrated by rds-ping.

*

CVE-2012-2745: The copy_creds function in
kernel/cred.c in the Linux kernel provided an invalid
replacement session keyring to a child process, which
allowed local users to cause a denial of service (panic)
via a crafted application that uses the fork system call.

*

CVE-2012-3412: The sfc (aka Solarflare Solarstorm)
driver in the Linux kernel allowed remote attackers to
cause a denial of service (DMA descriptor consumption and
network-controller outage) via crafted TCP packets that
trigger a small MSS value.

*

CVE-2012-3430: The rds_recvmsg function in
net/rds/recv.c in the Linux kernel did not initialize a
certain structure member, which allowed local users to
obtain potentially sensitive information from kernel stack
memory via a (1) recvfrom or (2) recvmsg system call on an
RDS socket.

*

CVE-2012-4461: The KVM subsystem in the Linux kernel,
when running on hosts that use qemu userspace without
XSAVE, allowed local users to cause a denial of service
(kernel OOPS) by using the KVM_SET_SREGS ioctl to set the
X86_CR4_OSXSAVE bit in the guest cr4 register, then calling
the KVM_RUN ioctl.

*

CVE-2012-5517: The online_pages function in
mm/memory_hotplug.c in the Linux kernel allowed local users
to cause a denial of service (NULL pointer dereference and
system crash) or possibly have unspecified other impact in
opportunistic circumstances by using memory that was
hot-added by an administrator.

A long list of other bugs have been fixed in this update
that were merged from regular SUSE Linux Enterprise 11 SP2
and are too many to list here. Check the kernel changelog
(rpm -q --changelog kernel-rt ) for a detailed list.

Merge SLE11-SP2, and update -rt version to rt61. No
rt changes this merge.

*

Kill apply/revert dance below that evolved over
3.0-rt development. It's all in history, and now just gets
in the way of stable comit
b1c7ba1bab7363fee6dc5d4ee5be4e916adcf691: workqueue:
perform cpu down operations from low priority cpu_notifier()

If the local_softirq_lock for a softirq is held,
don't gripe, there's nothing to be done about it. The nohz
code will prevent shutting down the tick, with the same
result as nohz=off, the pending softirq will be run when it
can be. What we _can_ do is wake the appropriate softirq
thread to potentially PI boost the lock holder, so do that.

*

mm: use cpu_chill() in spin_trylock_page() and cancel
on immediately RT. (bnc#768470)

*

Update config files.

o Unset CONFIG_WATCHDOG_NOWAYOUT to prevent
reboot of openais on service stop. (bnc#756585)
*

sched: Make sure to not re-read variables after
validation (bnc#769685).